Type: Overview

Change layout

The Top Events and Conferences for MSPs

The Top Events and Conferences for MSPs

It goes without saying that a problem shared is a problem halved. Additionally, it’s been proven that two heads working together are better than one. 

These, fundamentally, are the reasons why we persistently seek to learn from our peers and the MSP community at large. As a result, you get to expand your technical knowledge, as well as improve your overall service delivery and business development.  Continue reading

Why Cybercriminals Are Targeting MSPs?

Why Cybercriminals Are Targeting MSPs?

Cybercriminals are now attacking managed services providers typically hired to protect business assets from cybersecurity attacks. For one reason or another, many IT shops aren’t properly securing their own systems — and this oversight is not only damaging reputations but costing them money.  Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading

Clone Phishing Explained

Clone Phishing Explained

Clone Phishing Explained

Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading

HIPAA-Compliant Cloud Backup

HIPAA-Compliant Cloud Backup

For healthcare organizations, compliance is a major concern when deciding what to look for in a backup solution and cloud services. In this article, we will provide an overview of HIPAA basic principles, explain why the HIPAA regulation applies to cloud backup and discuss HIPAA-related backup requirements. We will also show how to create a HIPAA-compliant backup using CloudBerry software.

Continue reading

What Is Amazon S3 Glacier and How to Use It

What Is Amazon S3 Glacier and How to Use It

Amazon S3 is one of the core services offered by AWS. It is rightly marketed as “storage for the internet”. It has a wide variety of use cases, from serving static websites to hosting images, managing data lakes, and much more.

In this post, we will review the ins and outs of S3 Glacier. S3 Glacier is a special storage class of Amazon S3 that provides extremely cheap storage. Continue reading

VPN data leaks protection

How to Check Your VPN for Data Leaks

How to Check Your VPN for Data Leaks

Just a few short years ago, virtual private networks (VPNs) were a novel technology to the masses. The advanced security and anonymity they offered were only for paranoids and dissidents. Fast forward to today’s internet with its daily headlines of massive data breaches, government snooping, and a Dark Web with an endless appetite for your personal information. Continue reading